Gabriel Torres (MIT Lincoln Laboratory, Secure Resilient Systems & Technology, Lexington, MA), Raymond Govotski (MIT Lincoln Laboratory, Secure Resilient Systems & Technology, Lexington, MA), Samuel Jero (MIT Lincoln Laboratory, Secure Resilient Systems & Technology, Lexington, MA), Gruia-Catalin Roman (University of New Mexico, Department of Computer Science), Joseph “Dan” Trujillo (Air Force Research Laboratory, Space Vehicles Directorate), Richard Skowyra (MIT Lincoln Laboratory, Secure Resilient Systems & Technology, Lexington, MA), Samuel Mergendahl (MIT Lincoln Laboratory, Secure Resilient Systems & Technology, Lexington, MA)

As space systems increasingly leverage commercialoff- the-shelf (COTS) technology to reduce mission cost and facilitate faster deployment timelines, satellite systems must also consider the cybersecurity achievable from the commercially available technology prior to adoption. In this work, we explore the challenges and trade-offs in applying COTS technology for satellite systems. In particular, we introduce a generic, high-level architecture for secure, resilient boot and update typically required to achieve an appropriate cybersecurity posture onboard a satellite. Moreover, we explore the challenges we encountered when instantiating this architecture on three generations of COTS technology. Namely, we find that COTS systems often provide secure, resilient boot and update capabilities, but the cost benefits of COTS technology often come with inflexibility which leads space system architects to choose between either limited suitability of COTS deployment for their specific space mission needs or expensive extensions to the COTS platform.

View More Papers

OCCUPY+PROBE: Cross-Privilege Branch Target Buffer Side-Channel Attacks at Instruction...

Kaiyuan Rong (Tsinghua University, Zhongguancun Laboratory), Junqi Fang (Tsinghua University, Zhongguancun Laboratory), Haixia Wang (Tsinghua University), Dapeng Ju (Tsinghua University, Zhongguancun Laboratory), Dongsheng Wang (Tsinghua University, Zhongguancun Laboratory)

Read More

Formal Analysis of BLE Secure Connection Pairing and Revelation...

Min Shi (Wuhan University), Yongkang Xiao (Wuhan University), Jing Chen (Wuhan University), Kun He (Wuhan University), Ruiying Du (Wuhan University), Meng Jia (Department of Computing, the Hong Kong Polytechnic University)

Read More

Distributed Broadcast Encryption for Confidential Interoperability across Private Blockchains

Angelo De Caro (IBM Research Zurich), Kaoutar Elkhiyaoui (IBM Research Zurich), Sandeep Nishad (IBM Research India), Sikhar Patranabis (IBM Research India), Venkatraman Ramakrishna (IBM Research India)

Read More